Výsledky vyhledávání - python code encryption
-
1
Multicolor fluorescent adjustable hydrogel with high toughness, used for information encryption and alkaline stimulation response
ISSN: 0925-3467Vydáno: Elsevier B.V 01.11.2025Vydáno v Optical materials (01.11.2025)“…With the rapid development of the information age, fluorescent hydrogels are widely used in information encryption, while traditional hydrogels have disadvantages, such as poor mechanical properties…”
Získat plný text
Journal Article -
2
NEW CRYPTOSYSTEM USING LINEAR COMBINATION OF FUNCTION AND SUMUDU TRANSFORM WITH PYTHON CODE
ISSN: 2146-1147Vydáno: Turkic World Mathematical Society 01.01.2025Vydáno v TWMS journal of applied and engineering mathematics (01.01.2025)“… We also implemented this method using Python code and finally, we illustrate our results with suitable examples. Keywords: Cryptography, Sumudu Transform, Encryption, Decryption, Information Security…”
Získat plný text
Journal Article -
3
Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler
ISSN: 2542-6605, 2542-6605Vydáno: Elsevier B.V 01.04.2024Vydáno v Internet of things (Amsterdam. Online) (01.04.2024)“… It is, therefore, paramount to prove novel encryption algorithms at an experimental level. To overcome that, a potential solution is fractional-order multi-scroll chaotic…”
Získat plný text
Journal Article -
4
Methods and Benchmark for Detecting Cryptographic API Misuses in Python
ISSN: 0098-5589, 1939-3520Vydáno: New York IEEE 01.05.2024Vydáno v IEEE transactions on software engineering (01.05.2024)“… The current static code analysis tools for Python are unable to scan the increasing complexity of the source code…”
Získat plný text
Journal Article -
5
New Method of Cryptography Using Laplace and Sumudu Transforms With Python Code
ISSN: 1992-9978, 1992-9986Vydáno: Hong Kong International Association of Engineers 01.05.2025Vydáno v IAENG international journal of applied mathematics (01.05.2025)“… We used Python code to implement this method with examples. We also illustrate our method for Marathi language words and successfully applied it for encrypting paragraphs. Finally, we compared our method with existing cryptosystems for the advancements…”
Získat plný text
Journal Article -
6
Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem
ISSN: 1942-3594, 1942-3608Vydáno: Hershey IGI Global 01.04.2021Vydáno v International journal of applied evolutionary computation (01.04.2021)“… So there is a need of resolving crucial security issues to avoid data theft. Hence cloud security provides data encryption for security parameters to change plain-text to cipher-text…”
Získat plný text
Journal Article -
7
New Method of Cryptography With Python Code Using Elzaki Transform and Linear Combination of Function
ISSN: 0976-5905, 0975-8607Vydáno: Kingsville RGN Publications 01.01.2023Vydáno v Communications in Mathematics and Applications (01.01.2023)“… This paper deals with new cryptography based iterative method by using successive Elzaki transform of linear combination of functions for encryption and corresponding inverse Elzaki transform for decryption…”
Získat plný text
Journal Article -
8
Methodological recommendations for implementing an encryption algorithm using a codeword in Python
ISSN: 1857-0623, 2587-3636Vydáno: 01.03.2024Vydáno v Acta et commentationes: Științe ale Educației (01.03.2024)“… The development and execution of the Python program code was carried out in a free interactive cloud environment — Google Colab…”
Získat plný text
Journal Article -
9
Hands-On Cryptography with Python: Leverage the Power of Python to Encrypt and Decrypt Data
ISBN: 1789534445, 9781789534443Vydáno: Birmingham Packt Publishing, Limited 2018“… This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption…”
Získat plný text
E-kniha -
10
An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2020Vydáno v IEEE access (2020)“… One of the latest techniques is the use of the Memristor as an encryption element. In this paper, it has been introduced a two-column array inductor for Memristor-Based Wireless Power Transfer (M-WPT) systems…”
Získat plný text
Journal Article -
11
An Hybrid Encryption Approach to Secure Data
ISSN: 2582-3930, 2582-3930Vydáno: 24.12.2024Vydáno v INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (24.12.2024)“…: Advance Encryption standard (AES) algorithm, Hamming code, Image processing, Data security, Encryption, Decryption, python…”
Získat plný text
Journal Article -
12
Front-end Subsystem Design for Vehicle Registration Certificate Application with Image Encryption
Vydáno: IEEE 18.11.2021Vydáno v 2021 15th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (18.11.2021)“… This application also includes an encryption method…”
Získat plný text
Konferenční příspěvek -
13
Hands-On Bitcoin Programming with Python: Build Powerful Online Payment Centric Applications with Python
ISBN: 1789537002, 9781789537000Vydáno: Birmingham Packt Publishing, Limited 2018“…Bitcoin is a cryptocurrency that's changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the…”
Získat plný text
E-kniha -
14
Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology
ISSN: 1386-7857, 1573-7543Vydáno: New York Springer US 01.11.2024Vydáno v Cluster computing (01.11.2024)“…The Internet of Things (IoT), the convergence of blockchain and deep learning (DL) technologies presents exciting opportunities for innovation. The integration…”
Získat plný text
Journal Article -
15
Advancing Quantum Cryptography Algorithms for Secure Data Storage and Processing in Cloud Computing: Enhancing Robustness Against Emerging Cyber Threats
ISSN: 2158-107X, 2156-5570“… Performance evaluations indicate an encryption time…”Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2024
Získat plný text
Journal Article -
16
Demonstrating Quantum Homomorphic Encryption Through Simulation
Vydáno: IEEE 15.09.2024Vydáno v 2024 IEEE International Conference on Quantum Computing and Engineering (QCE) (15.09.2024)“… In this paradigm, homomorphic encryption (HE) schemes enable a server to run any computation on a client's encrypted data…”
Získat plný text
Konferenční příspěvek -
17
Software Protection Using Dynamic PUFs
ISSN: 1556-6013, 1556-6021Vydáno: New York IEEE 2020Vydáno v IEEE transactions on information forensics and security (2020)“… This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time…”
Získat plný text
Journal Article -
18
SYMMETRIC ENCRYPTION FROM CYCLIC CODES OVER NON-CHAIN RINGS
ISSN: 1844-9581, 2068-3049Vydáno: 30.09.2025Vydáno v Journal of the sciences and arts (30.09.2025)“…This paper introduces a novel encryption scheme constructed over the finite commutative ring S=F₂+uF₂+vF₂…”
Získat plný text
Journal Article -
19
Designing an Image Encryption user Interface System
ISSN: 2321-9653, 2321-9653Vydáno: 31.03.2023Vydáno v International journal for research in applied science and engineering technology (31.03.2023)“…“Designing an Image Encryption user Interface using Python and Octave” Data Security has become the paramount in most industries right this moment, especially true in the finance and banking industry…”
Získat plný text
Journal Article -
20
Entropy in Image Analysis II
ISBN: 3039431617, 9783039431618, 9783039431601, 3039431609Vydáno: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020“…Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated…”
Získat plný text
E-kniha

